Fuzzy logic - artificial intelligence, Computer Engineering

Assignment Help:

Fuzzy Logic - artificial intelligence:

In the above logic, we have been concerned with truth whether propositions and sentences are true. But, with some natural language statements, it is difficult to assign a "true" or "false" value. For instance, is the sentence: "Prince Charles is tall" true or false? Some people may say true, and others may say false, so there is an underlying probability that we might also want to represent. This can be attaining with so-called "fuzzy" logics. As such, the originator of fuzzy logics, Lotfi Zadeh, advocates not thinking about specific fuzzy logics but rather thinking about "fuzzification" of current theories, and this is starting to play a part in Artificial Intelligence. The arrangement of logics with programming agents and theories of probability to reason in the light of uncertain knowledge are important areas of Artificial Intelligence research. Various representation schemes such as Stochastic Logic Programs have an aspect of both logic and probability.


Related Discussions:- Fuzzy logic - artificial intelligence

We declare a table control in the abap/4 program, How can we declare a tabl...

How can we declare a table control in the ABAP/4 program? Using the syntax controls type tableview using screen .

Sap system configuration, SAP system configuration includes It include...

SAP system configuration includes It includes :- a) Dialog tasks b) Update tasks.

Electric typewriter in information distribution, Electric typewriter : Ele...

Electric typewriter : Electric typewriters are similar to standard typewriters but with an electronic motor taking the place of human energy. It is much faster than the standard m

Describe the various characteristics of udp protocol, Describe the various ...

Describe the various characteristics of UDP protocol. The characteristics of the UDP are as follows: End to end: UDP is transport protocols that can distinguish between

Cost involved in inter - processor communication, Cost Involved in Inter-Pr...

Cost Involved in Inter-Processor Communication Because data is assigned to too many processors in a parallel computer whilst executing a parallel algorithm processors may be ne

Evaluate expression by using convention , Evaluate x = A ‾.B + C ( ) usin...

Evaluate x = A ‾.B + C ( ) using the convention A = True and B = False. Ans. Simplify given expression x = A ‾ .B + C ( ) as = A ‾ B + C (A ‾ + D ‾ ) (As = A ‾ +D ‾ usin

Methods to resolve collision during hashing., What are the two methods to r...

What are the two methods to resolve collision during hashing. The two methods to resolve collision during hashing are: a) Open addressing and b) Chaining.

What are privileged instructions, What are privileged instructions?  So...

What are privileged instructions?  Some of the machine instructions that might cause harm to a system are designated as privileged instructions. The hardware permits the privil

For what DMSP stands, For what DMSP stands? DMSP stans here for Dist ri...

For what DMSP stands? DMSP stans here for Dist ributed Mai l system Protocol.

Basic need of random access memory, Q. Basic need of Random Access Memory? ...

Q. Basic need of Random Access Memory? Main memory is Random access memory. It is generally organised as words of fixed length. Length of a word is termed as word length. Every

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd